General

  • Target

    e43a7ad7f9b0b0aba1bccfa59a1fc261feae039a3d5ddb0d3fb659dad3020eb8

  • Size

    16KB

  • MD5

    b4cf2cc046b57654e7877de0c3d806af

  • SHA1

    361d5a7f274a37f62999649c2fe4dd19c3467592

  • SHA256

    e43a7ad7f9b0b0aba1bccfa59a1fc261feae039a3d5ddb0d3fb659dad3020eb8

  • SHA512

    3925cd5eff817a31abd970ffebf9629ea16420392d5a117dafcd6e551978cf1c4d7ab3c31f325c6f9e6ee186804d3d0895e98cec9e3c503a1c7a5e6299ec4f18

  • SSDEEP

    384:+LG8z5gP77IfW2JOUwZgReS9GhbV27YxNxYe1x5VaDAsTF:+a85E7I1JFGgReS9G5xPYe1vVaDA2

Score
10/10

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

HacKed

C2

0.tcp.eu.ngrok.io:18335

Mutex

8aa77e32fd8a52c53e1795fcb8a0a489

Attributes
  • reg_key

    8aa77e32fd8a52c53e1795fcb8a0a489

  • splitter

    |'|'|

Signatures

  • Njrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • e43a7ad7f9b0b0aba1bccfa59a1fc261feae039a3d5ddb0d3fb659dad3020eb8
    .zip

    Password: infected

  • 780fb69b0fe5c6bd10671e12e3fe12662999503e3a4d18c0c6d7b0b316661846.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections